首页 > 最新文献

Jordanian Journal of Computers and Information Technology最新文献

英文 中文
AN IMPROVED FRACTIONAL TWO-DIMENSIONAL PRINCIPAL COMPONENT ANALYSIS FOR FACE RECOGNITION 一种改进的分数二维主成分分析用于人脸识别
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.5455/jjcit.71-1637874750
F. Alsaqre
{"title":"AN IMPROVED FRACTIONAL TWO-DIMENSIONAL PRINCIPAL COMPONENT ANALYSIS FOR FACE RECOGNITION","authors":"F. Alsaqre","doi":"10.5455/jjcit.71-1637874750","DOIUrl":"https://doi.org/10.5455/jjcit.71-1637874750","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CERVICAL CANCER DETECTION AND CLASSIFICATION USING MRIS 子宫颈癌的mri检测与分型
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.5455/jjcit.71-1640595124
Ichrak Khoulqi, N. Idrissi
{"title":"CERVICAL CANCER DETECTION AND CLASSIFICATION USING MRIS","authors":"Ichrak Khoulqi, N. Idrissi","doi":"10.5455/jjcit.71-1640595124","DOIUrl":"https://doi.org/10.5455/jjcit.71-1640595124","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"17 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Consensual based classification as emergent decisions in a complex system 基于共识的分类作为复杂系统中的紧急决策
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.5455/jjcit.71-1638972901
Rabah Mazouzi, M. Ndenga, Cyril de Runz, H. Akdag
{"title":"Consensual based classification as emergent decisions in a complex system","authors":"Rabah Mazouzi, M. Ndenga, Cyril de Runz, H. Akdag","doi":"10.5455/jjcit.71-1638972901","DOIUrl":"https://doi.org/10.5455/jjcit.71-1638972901","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RULE-BASED APPROACH FOR CONTEXT-AWARE COLLABORATIVE RECOMMENDER SYSTEM 基于规则的上下文感知协同推荐系统
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.5455/jjcit.71-1641418357
S. Benhamdi, A. Babouri, Raja Chiky, Jamal Nebhen
{"title":"RULE-BASED APPROACH FOR CONTEXT-AWARE COLLABORATIVE RECOMMENDER SYSTEM","authors":"S. Benhamdi, A. Babouri, Raja Chiky, Jamal Nebhen","doi":"10.5455/jjcit.71-1641418357","DOIUrl":"https://doi.org/10.5455/jjcit.71-1641418357","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FEATURE LEVEL FUSION FRAMEWORK FOR BRAIN MR IMAGE CLASSIFICATION USING SUPERVISED DEEP LEARNING AND HAND CRAFTED FEATURES 基于监督深度学习和手工特征的脑磁共振图像分类特征融合框架
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.5455/jjcit.71-1655376900
P. N, Prashantha J
In this paper, we propose an efficient fusion framework for brain magnetic resonance (MR) image classification using deep learning and handcrafted feature extraction methods, namely histogram of oriented gradients (HOG) and local binary patterns (LBP). The proposed framework aims to: (1) determine the optimal handcrafted features by Genetic Algorithm (GA) (2) discover the fully connected (FC) layers features using fine-tuned convolutional neural network (CNN) (3) employs the canonical correlation analysis (CCA) and the discriminant correlation analysis (DCA) methods in feature level fusion. Extensive experiments were conducted and demonstrated the classification performance on three benchmark datasets, viz., RD-DB1, TCIA-IXI-DB2 and TWB-HM-DB3. The mean accuracy of 68.69%, 90.35%, and 93.15% from CCA and 77.22%, 100.00%, and 99.40% from DCA was achieved by the Support Vector Machines (SVM) sigmoid kernel classifier on RD-DB1, TCIA-IXI-DB2, and TWB-HM-DB3 respectively. The obtained results of the proposed framework outperform when compared with other state-of-art works.
本文提出了一种基于深度学习和手工特征提取方法的脑磁共振图像分类融合框架,即定向梯度直方图(HOG)和局部二值模式(LBP)。该框架旨在:(1)通过遗传算法(GA)确定最优的手工特征;(2)使用微调卷积神经网络(CNN)发现全连接(FC)层特征;(3)在特征级融合中采用典型相关分析(CCA)和判别相关分析(DCA)方法。在RD-DB1、tcia - ix - db2和TWB-HM-DB3三个基准数据集上进行了大量实验,验证了分类性能。支持向量机(SVM) sigmoid核分类器在RD-DB1、TCIA-IXI-DB2和TWB-HM-DB3上对CCA的平均准确率分别为68.69%、90.35%和93.15%,对DCA的平均准确率分别为77.22%、100.00%和99.40%。与其他最先进的工作相比,所提出的框架获得的结果优于其他最先进的工作。
{"title":"FEATURE LEVEL FUSION FRAMEWORK FOR BRAIN MR IMAGE CLASSIFICATION USING SUPERVISED DEEP LEARNING AND HAND CRAFTED FEATURES","authors":"P. N, Prashantha J","doi":"10.5455/jjcit.71-1655376900","DOIUrl":"https://doi.org/10.5455/jjcit.71-1655376900","url":null,"abstract":"In this paper, we propose an efficient fusion framework for brain magnetic resonance (MR) image classification using deep learning and handcrafted feature extraction methods, namely histogram of oriented gradients (HOG) and local binary patterns (LBP). The proposed framework aims to: (1) determine the optimal handcrafted features by Genetic Algorithm (GA) (2) discover the fully connected (FC) layers features using fine-tuned convolutional neural network (CNN) (3) employs the canonical correlation analysis (CCA) and the discriminant correlation analysis (DCA) methods in feature level fusion. Extensive experiments were conducted and demonstrated the classification performance on three benchmark datasets, viz., RD-DB1, TCIA-IXI-DB2 and TWB-HM-DB3. The mean accuracy of 68.69%, 90.35%, and 93.15% from CCA and 77.22%, 100.00%, and 99.40% from DCA was achieved by the Support Vector Machines (SVM) sigmoid kernel classifier on RD-DB1, TCIA-IXI-DB2, and TWB-HM-DB3 respectively. The obtained results of the proposed framework outperform when compared with other state-of-art works.","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SENTIMENT ANALYSIS BASED ON PROBABILISTIC CLASSIFIER TECHNIQUES IN VARIOUS INDONESIAN REVIEW DATA 基于概率分类器技术的印尼语评论数据情感分析
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.5455/jjcit.71-1646912715
Nur Hayatin, Suraya Alias, L. Hung, M. Sainin
Sentiment analysis is the field in data science to achieve a broader holistic view of users’ needs and expectations. Indonesian user opinions have the potential to manage to be valuable information using sentiment analysis tasks. One of the most supervised learning techniques used in Indonesian sentiment analysis is the Naïve Bayes classifier. The classifier can be optimized and tuned in various models to increase the sentiment analysis model performance. This research aims to examine the performance of various Naïve Bayes models in sentiment analysis, especially when implemented in small datasets to handle overfitting problems. Four different Naïve Bayes models used are Gaussian, Multinomial, Complement, and Bernoulli. We also analyse the effect of various pre-processing techniques on the models’ performance. Moreover, we build the first fashion dataset from the Indonesian marketplace which has a unique character compared to the datasets from other domains. Finally, we also use the various dataset in the experiment to test the Naïve Bayes models' performance. From the experiment result, Complement Naïve Bayes is superior to other models, especially in handling overfitting with F1-score of approximately 0.82.
情感分析是数据科学的一个领域,它可以更广泛地全面了解用户的需求和期望。使用情感分析任务,印尼用户的意见有可能成为有价值的信息。印度尼西亚情感分析中使用的最受监督的学习技术之一是Naïve贝叶斯分类器。分类器可以在各种模型中进行优化和调优,以提高情感分析模型的性能。本研究旨在检验各种Naïve贝叶斯模型在情感分析中的性能,特别是在小数据集中实现以处理过拟合问题时。四种不同的Naïve贝叶斯模型使用高斯,多项式,补和伯努利。我们还分析了各种预处理技术对模型性能的影响。此外,我们建立了第一个来自印度尼西亚市场的时尚数据集,与其他领域的数据集相比,该数据集具有独特的特征。最后,我们还使用实验中的各种数据集来测试Naïve贝叶斯模型的性能。从实验结果来看,Complement Naïve Bayes优于其他模型,特别是在处理过拟合方面,F1-score约为0.82。
{"title":"SENTIMENT ANALYSIS BASED ON PROBABILISTIC CLASSIFIER TECHNIQUES IN VARIOUS INDONESIAN REVIEW DATA","authors":"Nur Hayatin, Suraya Alias, L. Hung, M. Sainin","doi":"10.5455/jjcit.71-1646912715","DOIUrl":"https://doi.org/10.5455/jjcit.71-1646912715","url":null,"abstract":"Sentiment analysis is the field in data science to achieve a broader holistic view of users’ needs and expectations. Indonesian user opinions have the potential to manage to be valuable information using sentiment analysis tasks. One of the most supervised learning techniques used in Indonesian sentiment analysis is the Naïve Bayes classifier. The classifier can be optimized and tuned in various models to increase the sentiment analysis model performance. This research aims to examine the performance of various Naïve Bayes models in sentiment analysis, especially when implemented in small datasets to handle overfitting problems. Four different Naïve Bayes models used are Gaussian, Multinomial, Complement, and Bernoulli. We also analyse the effect of various pre-processing techniques on the models’ performance. Moreover, we build the first fashion dataset from the Indonesian marketplace which has a unique character compared to the datasets from other domains. Finally, we also use the various dataset in the experiment to test the Naïve Bayes models' performance. From the experiment result, Complement Naïve Bayes is superior to other models, especially in handling overfitting with F1-score of approximately 0.82.","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70821291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybridization of Arithmetic Optimization with Great Deluge Algorithms for Feature Selection Problems in Medical Diagnoses 医学诊断特征选择问题的算法优化与大洪水算法的杂交
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.5455/jjcit.71-1639410312
Mohammed Alweshah
In the field of medicine, there is a need to filter data to find information that is relevant for specific research problems. However, in the realm of scientific study, the process of selecting the appropriate data or features is a substantial and challenging problem. Therefore, in this paper, two wrapper feature selection (FS) methods based on novel metaheuristic algorithms named the arithmetic optimization algorithm (AOA) and the great deluge algorithm (GDA) were used to attempt to tackle the medical diagnostics challenge. Two methods, AOA and AOA-GD were tested on 23 medical benchmark datasets. According to all of the experimental data, the hybridization of the GDA with the AOA considerably increased the AOA’s search capability. The AOA-GD method was then compared with two previous wrapper FS approaches;namely, the coronavirus herd immunity optimizer with greedy crossover operator (CHIO-GC) and the binary moth flame optimization with Lévy flight (LBMFO_V3). When applied to the 23 medical benchmark datasets, the AOA-GD achieved an accuracy rate of 0.80, thereby surpassing both the CHIO-GC and LBMFO V3.
在医学领域,需要对数据进行过滤,以找到与特定研究问题相关的信息。然而,在科学研究领域,选择合适的数据或特征的过程是一个实质性的和具有挑战性的问题。因此,本文采用基于新型元启发式算法的两种包装器特征选择(FS)方法,即算法优化算法(AOA)和大洪水算法(GDA)来尝试解决医疗诊断挑战。在23个医学基准数据集上对AOA和AOA- gd两种方法进行了检验。所有实验数据表明,GDA与AOA的杂交极大地提高了AOA的搜索能力。然后,将AOA-GD方法与之前的两种包装器FS方法进行比较,即带有贪心交叉算子的冠状病毒群体免疫优化器(CHIO-GC)和带有lsamvy飞行的二元蛾焰优化器(LBMFO_V3)。应用于23个医学基准数据集时,AOA-GD的准确率达到0.80,超过了CHIO-GC和LBMFO V3。
{"title":"Hybridization of Arithmetic Optimization with Great Deluge Algorithms for Feature Selection Problems in Medical Diagnoses","authors":"Mohammed Alweshah","doi":"10.5455/jjcit.71-1639410312","DOIUrl":"https://doi.org/10.5455/jjcit.71-1639410312","url":null,"abstract":"In the field of medicine, there is a need to filter data to find information that is relevant for specific research problems. However, in the realm of scientific study, the process of selecting the appropriate data or features is a substantial and challenging problem. Therefore, in this paper, two wrapper feature selection (FS) methods based on novel metaheuristic algorithms named the arithmetic optimization algorithm (AOA) and the great deluge algorithm (GDA) were used to attempt to tackle the medical diagnostics challenge. Two methods, AOA and AOA-GD were tested on 23 medical benchmark datasets. According to all of the experimental data, the hybridization of the GDA with the AOA considerably increased the AOA’s search capability. The AOA-GD method was then compared with two previous wrapper FS approaches;namely, the coronavirus herd immunity optimizer with greedy crossover operator (CHIO-GC) and the binary moth flame optimization with Lévy flight (LBMFO_V3). When applied to the 23 medical benchmark datasets, the AOA-GD achieved an accuracy rate of 0.80, thereby surpassing both the CHIO-GC and LBMFO V3.","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Early Detection Model for KerberoastingAttacks and Dataset Labeling kerberos攻击的早期检测模型及数据集标注
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.5455/jjcit.71-1661423262
Remah Younisse, Mouhammd Alkasassbeh, Mohammad Almseidin, Hamza Abdi
The wild nature of humans has become civilized, and the weapons they use to attack each other are now digitized. Security over the Internet usually takes a defensive shape, aiming to fight against attacks created for malicious reasons. Invaders’ actions over the internet can take patterns by going through specific steps every time they attack. These patterns can be used to predict, mitigate and stop these attacks. This study proposes a method to label datasets related to multi-stage attacks according to attack stages rather than the attack type. These datasets can be used later in machine learning models to build intelligent defensive models. On the other hand, we propose a method to predict and early kill attacks in an active directory environment, such as Kerberoasting attacks. In this study, we have collected the data related to a suggested Kerberoasting attack scenario in pcap files. Every pcap file contains the data related to a particular stage of the attack lifecycle, the extracted information from the pcap files was used to highlight the features and specific activities during every stage. The information was used to draw an efficient defensive plan against the attack. Here we propose a methodology to draw equivalent defensive plans for other similar attacks as the Kerberoasting attack covered in this study.
人类的野性变得文明了,他们用来互相攻击的武器现在也数字化了。互联网上的安全通常采取防御形式,旨在对抗恶意攻击。入侵者在互联网上的行动可以通过每次攻击都经过特定的步骤来形成模式。这些模式可用于预测、减轻和阻止这些攻击。本研究提出了一种根据攻击阶段而不是攻击类型来标记与多阶段攻击相关的数据集的方法。这些数据集可以在机器学习模型中使用,以构建智能防御模型。另一方面,我们提出了一种在活动目录环境中预测和早期消灭攻击的方法,例如Kerberoasting攻击。在本研究中,我们在pcap文件中收集了与建议的kerberoasting攻击场景相关的数据。每个pcap文件都包含与攻击生命周期的特定阶段相关的数据,从pcap文件中提取的信息用于突出显示每个阶段的功能和特定活动。这些信息被用来制定一个有效的防御计划。在这里,我们提出了一种方法,可以为本研究中涉及的kerberos攻击等其他类似攻击制定等效的防御计划。
{"title":"An Early Detection Model for Kerberoasting\u0000Attacks and Dataset Labeling","authors":"Remah Younisse, Mouhammd Alkasassbeh, Mohammad Almseidin, Hamza Abdi","doi":"10.5455/jjcit.71-1661423262","DOIUrl":"https://doi.org/10.5455/jjcit.71-1661423262","url":null,"abstract":"The wild nature of humans has become civilized, and the weapons they use to attack each other are now digitized. Security over the Internet usually takes a defensive shape, aiming to fight against attacks created for malicious reasons. Invaders’ actions over the internet can take patterns by going through specific steps every time they attack. These patterns can be used to predict, mitigate and stop these attacks. This study proposes a method to label datasets related to multi-stage attacks according to attack stages rather than the attack type. These datasets can be used later in machine learning models to build intelligent defensive models. On the other hand, we propose a method to predict and early kill attacks in an active directory environment, such as Kerberoasting attacks. In this study, we have collected the data related to a suggested Kerberoasting attack scenario in pcap files. Every pcap file contains the data related to a particular stage of the attack lifecycle, the extracted information from the pcap files was used to highlight the features and specific activities during every stage. The information was used to draw an efficient defensive plan against the attack. Here we propose a methodology to draw equivalent defensive plans for other similar attacks as the Kerberoasting attack covered in this study.","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70821062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DES22: DES BASED ALGORITHM WITH IMPROVED SECURITY Des22:基于des的算法,提高了安全性
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.5455/jjcit.71-1632868199
Malek Barhoush, Bilal Alguni, Rafat Hammad, Mohammad Fawareh, Rana Hassan
{"title":"DES22: DES BASED ALGORITHM WITH IMPROVED SECURITY","authors":"Malek Barhoush, Bilal Alguni, Rafat Hammad, Mohammad Fawareh, Rana Hassan","doi":"10.5455/jjcit.71-1632868199","DOIUrl":"https://doi.org/10.5455/jjcit.71-1632868199","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FULLY OPTIMIZED ULTRA WIDEBAND RF RECEIVER FRONT END 全面优化的超宽带射频接收机前端
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.5455/jjcit.71-1644147942
R. Khatri, D. Mishra
{"title":"FULLY OPTIMIZED ULTRA WIDEBAND RF RECEIVER FRONT END","authors":"R. Khatri, D. Mishra","doi":"10.5455/jjcit.71-1644147942","DOIUrl":"https://doi.org/10.5455/jjcit.71-1644147942","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Jordanian Journal of Computers and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1